This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures.
This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.
"synopsis" may belong to another edition of this title.
Dr. Basel Halak is the director of the Embedded Systems Master program at Southampton University. He is a member of the Sustainable Electronics Research group, as well as, Cyber Security group at Electronics and Computer Science School (ECS). He has written over 60 conference and journal papers, and authored two books. He has received his PhD degree in Microelectronics System Design from Newcastle University. He was then awarded a knowledge transfer fellowship to develop secure and energy efficient design for portable health care monitoring systems. His background is on the design and implementation of microelectronics systems, with special focus on developing secure hardware implementation for cryptographic primitives such as physically unclonable functions. Dr Halak lectures on digital design, Secure Hardware and Cryptography, supervises a number of MSc and PhD students, and is also leading the European Masters in Embedded Computing Systems (EMECS). He is the recipient of the Vice Chancellor Teaching Award in 2016, and the bronze leaf award in IEEE PRIME conference for his paper on current-based physically unclonable functions. He is a senior fellow of the Higher Education Academy (HEA), a guest editor of the IET CDT, and serves on several technical program committees such as IEEE ICCCA, ICCCS, MTV, IVSW, MicDAT and EWME. He is also member of hardware security working group of the World Wide Web Consortium (W3C).
This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book:
This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.
"About this title" may belong to another edition of this title.
Seller: BooksRun, Philadelphia, PA, U.S.A.
Hardcover. Condition: Good. 1st ed. 2018. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience. Seller Inventory # 3319768034-11-1
Seller: SpringBooks, Berlin, Germany
Hardcover. Condition: As New. 1. Auflage. Unread, like new. Immediately dispatched from Germany. Seller Inventory # CEA-2401C-KUECHREGAL-03-1000XS
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar3113020105279
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 31311648-n
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 31311648
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Buch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures.This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading. 272 pp. Englisch. Seller Inventory # 9783319768038
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 31311648
Quantity: Over 20 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 31311648-n
Quantity: Over 20 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. Seller Inventory # 26375701346
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Provides readers with a comprehensive overview of security threats on embedded systems and existing countermeasuresIncludes an intensive tutorial on how to design and evaluate physically unclonable functions, supported by circuit diagrams and exem. Seller Inventory # 206520167
Quantity: Over 20 available